this post was submitted on 24 Aug 2023
21 points (100.0% liked)

cybersecurity

3164 readers
1 users here now

An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!

Community Rules

Enjoy!

founded 1 year ago
MODERATORS
 

The vulnerability should be obvious: at some point in the boot process, the VMK transits unencrypted between the TPM and the CPU. This means that it can be captured and used to decrypt the disk.

you are viewing a single comment's thread
view the rest of the comments
[–] nothacking@discuss.tchncs.de 4 points 1 year ago

There are certainly useful uses for trusted computing, like discouraging tampering with distributed computing projects, but they are used much more often to implement DRM and restrict hardware. They don't it to be impossible, just hard enough that the average user gives up.

Currently it is possible for an average user to to install Linux, but if that process requires hardware tampering (no normal person will decap chips), almost no one will do it.